BHyPreC: a novel Bi-LSTM based hybrid recurrent neural network model to predict the CPU workload of cloud virtual machine

ME Karim, MMS Maswood, S Das, AG Alharbi - IEEE Access, 2021 - ieeexplore.ieee.org
With the advancement of cloud computing technologies, there is an ever-increasing demand
for the maximum utilization of cloud resources. It increases the computing power …

Analytical review of data security in cloud computing

M Joshi, S Budhani, N Tewari… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
All the organization wants to implement the same security parameters as they are already
using with their internal data/resources. It is mandatory to understand and find the data …

Data Privacy, Compliance, and Security in Cloud Computing for Finance

S Yalamati - Practical Applications of Data Processing, Algorithms …, 2024 - igi-global.com
In the rapidly evolving landscape of finance, where data integrity and security are
paramount, the adoption of cloud computing presents both opportunities and challenges …

Educación financiera: Origen, análisis y evolución de las aportaciones científicas utilizando técnicas bibliométricas en la Web of Science

JEL Bazán, V Oscar… - Inquietud Empresarial, 2021 - revistas.uptc.edu.co
El desarrollo de las nuevas tecnologías de la información, así como el perfil de las nuevas
generaciones, han incentivado a las instituciones financieras a buscar una mayor inclusión …

Information Leakage Techniques in Cloud Computing: A Review

G Saini, N Kaur - 2022 2nd International Conference on …, 2022 - ieeexplore.ieee.org
Cloud computing is referred as a model that facilitates universal, suitable and on-demand
network access for commonly used configurable computing resources having the ability of …

Information security risks, benefits, and mitigation measures in cloud sourcing

F Wulf, S Strahringer, M Westner - 2019 IEEE 21st Conference …, 2019 - ieeexplore.ieee.org
This paper develops a categorization of cloud security risks, elaborates how they impact
information security, and discusses potential security benefits from cloud sourcing. This …

Confidential VMs Explained: An Empirical Analysis of AMD SEV-SNP and Intel TDX

M Misono, D Stavrakakis, N Santos… - Proceedings of the ACM …, 2024 - dl.acm.org
Confidential computing is gaining traction in the cloud, driven by the increasing security and
privacy concerns across various industries. Recent trusted hardware advancements …

Enhancing Fraud Detection in Banking with Deep Learning: Graph Neural Networks and Autoencoders for Real-Time Credit Card Fraud Prevention

FK Alarfaj, S Shahzadi - IEEE Access, 2024 - ieeexplore.ieee.org
Under the umbrella of artificial intelligence (AI), deep learning enables systems to cluster
data and provide incredibly accurate results. This study explores deep learning for fraud …

Analytics on real time security attacks in healthcare, retail and banking applications in the cloud

K Padmaja, R Seshadri - Evolutionary Intelligence, 2021 - Springer
Cloud computing is used by large enterprises to provide services to customers. The major
advantage of adapting cloud systems is that the clients need not have to manage the …

An improved cloud-based business process compliance management system using a user-centered approach

AM Mustapha, OT Arogundade, A Abayomi-Alli… - International Journal of …, 2024 - Springer
Despite the advantages of cloud services, businesses still face compliance challenges.
Some have withdrawn from cloud services due to the inability to adhere completely to …